• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
fbi charges 6, seizes 48 domains linked to ddos for hire service

FBI Charges 6, Seizes 48 Domains Linked to DDoS-for-Hire Service Platforms

You are here: Home / General Cyber Security News / FBI Charges 6, Seizes 48 Domains Linked to DDoS-for-Hire Service Platforms
December 15, 2022

The U.S. Department of Justice (DoJ) on Wednesday introduced the seizure of 48 domains that available products and services to conduct dispersed denial-of-services (DDoS) attacks on behalf of other danger actors, efficiently lowering the barrier to entry for malicious exercise.

It also billed 6 suspects – Jeremiah Sam Evans Miller (23), Angel Manuel Colon Jr. (37), Shamar Shattock (19), Cory Anthony Palmer (22), John M. Dobbs (32), and Joshua Laing (32) – for their alleged possession in the procedure.

The internet sites “authorized paying buyers to launch highly effective dispersed denial-of-service, or DDoS, attacks that flood specific pcs with information and facts and reduce them from becoming ready to accessibility the internet,” the DoJ mentioned in a push statement.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


CyberSecurity

The 6 defendants have been billed with different jogging booter (or stresser) providers, including RoyalStresser[.]com, SecurityTeam[.]io, Astrostress[.]com, Booter[.]sx, IPStresser[.]com, and TrueSecurityServices[.]io. They have also been accused of violating the computer system fraud and abuse act.

These internet websites, even though declaring to offer screening services to evaluate the resilience of a paying out customer’s web infrastructure, are thought to have targeted various victims in the U.S. and elsewhere, these kinds of as educational establishments, governing administration organizations, and gaming platforms.

The DoJ observed that millions of persons have been attacked making use of the DDoS-for-hire platforms. In accordance to court paperwork, more than one million registered consumers of IPStresser[.]com executed or tried to carry out extra than 30 million DDoS attacks amongst 2014 and 2022.

An assessment of communications involving the booter site administrators and their prospects undertaken by the U.S. Federal Bureau of Investigation (FBI) shows that the expert services are attained as a result of a cryptocurrency payment.

“Proven booter and stresser expert services supply a effortless implies for malicious actors to carry out DDoS attacks by permitting this sort of actors to pay for an current network of infected equipment, fairly than making their individual,” the FBI claimed. “Booter and stresser expert services might also obscure attribution of DDoS action.”

The enhancement comes 4 decades after the DoJ and FBI took equivalent actions in December 2018 to seize 15 domains that marketed personal computer attack platforms like Critical-boot[.]com, RageBooter[.]com, downthem[.]org, quantumstress[.]net, Booter[.]ninja, and Vbooter[.]org.

The area takedowns are section of an ongoing coordinated law enforcement exertion codenamed Procedure PowerOFF in collaboration with the U.K., the Netherlands, and Europol aimed at dismantling prison DDoS-for-hire infrastructures all over the world.

Identified this report interesting? Abide by us on Twitter  and LinkedIn to read through additional exclusive articles we put up.


Some sections of this short article are sourced from:
thehackernews.com

Previous Post: «hacking using svg files to smuggle qbot malware onto windows Hacking Using SVG Files to Smuggle QBot Malware onto Windows Systems
Next Post: Hackers Bombard Open Source Repositories with Over 144,000 Malicious Packages hackers bombard open source repositories with over 144,000 malicious packages»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root
  • Qilin Leads April 2025 Ransomware Spike with 45 Breaches Using NETXLOADER Malware
  • Security Tools Alone Don’t Protect You — Control Effectiveness Does

Copyright © TheCyberSecurity.News, All Rights Reserved.